M. Ali, J. Mohajeri, M.-R. Sadeghi, and X. Liu, “A fully distributed hierarchical attribute-based encryption scheme,” Theor. Comput. Sci., vol.815, pp. 25–46, 2020.
 V. Chang, M. Ramachandran, Y. Yao, Y.-H. Kuo, and C.-S. Li, “A resiliency framework for an enterprise cloud,” Int. J. Inf. Manage., vol. 36, no.1, pp. 155–166, 2016.
 J. Katz and Y. Lindell, Introduction to modern cryptography, 3rd ed. Boca Raton, FL: CRC Press, 2020.
 M. Ali and X. Liu, “Lightweight verifiable data management system for cloud-assisted wireless body area networks,” Peer Peer Netw. Appl., vol.15, no. 4, pp. 1792–1816, 2022.
 S. Boonkrong, Authentication and access control: Practical cryptography methods and tools, 1st ed. Berlin, Germany: APress, 2020.
 A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology, Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 47–53.
 M. Ali, J. Mohajeri, M.-R. Sadeghi, and X. Liu, “Attribute-based fine-grained access control for outscored private set intersection computation,” Inf. Sci. (Ny), vol. 536, pp. 222–243, 2020.
 M. Ali and M.-R. Sadeghi, “Provable secure lightweight attribute-based keyword search for cloud-based Internet of Things networks: Provable secure lightweight attribute-based keyword search for cloud-based Internet of Things networks,” Trans. emerg. telecommun. technol., vol.32, no. 5, p. e3905, 2021.
 M. Ali, M.-R. Sadeghi, and X. Liu, “Lightweight fine-grained access control for wireless body area networks,” Sensors (Basel), vol. 20, no. 4, p. 1088, 2020.
 M. Ali, M.-R. Sadeghi, and X. Liu, “Lightweight revocable hierarchical attribute-based encryption for internet of things,” IEEE Access, vol. 8, pp.23951–23964, 2020.
 Y. Deswarte, J.-J. Quisquater, and A. Sa¨ıdane, “Remote integrity checking,” in Integrity and Internal Control in Information Systems VI, Boston: Kluwer Academic Publishers, 2005, pp. 1–11.
 A. Juels and B. S. Kaliski, “Pors.” Proceedings of the 14th ACM conference on Computer and communications security - CCS , 2007, doi: 10.1145/1315245.1315317.
 G. Ateniese, “Provable data possession at untrusted stores.” Proceedings of the 14th ACM conference on Computer and communications security - CCS , 2007, doi: 10.1145/1315245.1315318.
 H. Wang, “Identity-Based Distributed Provable Data Possession in Multicloud Storage.” IEEE Transactions on Services Computing, vol. 8, no.2, pp. 328-340, 2015, doi: 10.1109/tsc.2014.1.
 Y. Yu, M. H. Au, G. Ateniese, X. Huang, W.Susilo, Y. Dai, G. Min, Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage, IEEE Transactions on Information Forensics and Security 12 (4) (2016)
 H. Wang, D. He, and S. Tang, “Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.” IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1165-1176, 2016, doi: 10.1109/tifs.2016.2520886.
 H. K. Maji, M. Prabhakaran, M. Rosulek, Attribute-based signatures: Achieving attributeprivacy and collusion-resistance., IACR Cryptology ePrint Archive 2008 (2008) 328.
 J. Li, M. H. Au, W. Susilo, D. Xie, K. Ren, Attribute-based signature and its applications, in: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ACM, 2010, pp. 60–69.
 J. Herranz, F. Laguillaumie, B. Libert, C. R`afols, Short attributebased signatures for threshold predicates, in: Cryptographers’ Track at the RSA Conference, Vol. 7178, Springer, 2012, pp. 51–67.
 X. Chen, J. Li, X. Huang, J. Li, Y. Xiang, D.S. Wong, Secure outsourced attribute-based signatures, IEEE Transactions on Parallel and Distributed Systems 25 (12) (2014) 3285–3294.
 J. Sun, Y. Su, J. Qin, J. Hu, J. Ma, Outsourced decentralized multiauthority attribute based signature and its application in IoT, IEEE Transactions on Cloud Computing 9 (3) (2019) 1195–1209.
 Y. Yu, Y. Li, B. Yang, W. Susilo, G. Yang, J.Bai, Attribute-based cloud data integrity auditing for secure outsourced storage, IEEE Transactions on Emerging Topics in Computing 8 (2) (2017) 377– 390.